JFIF x x C C " } !1AQa "q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w !1AQ aq"2B #3Rbr{
File "Signature.php"
Full Path: /home/palsarh/web/palsarh.in/public_html/vendor/google/apiclient-services/src/BinaryAuthorization/Signature.php
File size: 3.63 KB
MIME-type: text/x-php
Charset: utf-8
<?php
/*
* Copyright 2014 Google Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
* use this file except in compliance with the License. You may obtain a copy of
* the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations under
* the License.
*/
namespace Google\Service\BinaryAuthorization;
class Signature extends \Google\Model
{
/**
* The identifier for the public key that verifies this signature. * The
* `public_key_id` is required. * The `public_key_id` SHOULD be an RFC3986
* conformant URI. * When possible, the `public_key_id` SHOULD be an immutable
* reference, such as a cryptographic digest. Examples of valid
* `public_key_id`s: OpenPGP V4 public key fingerprint: *
* "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See
* https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
* details on this scheme. RFC6920 digest-named SubjectPublicKeyInfo (digest
* of the DER serialization): *
* "ni:sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU" * "nih:sha-
* 256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
*
* @var string
*/
public $publicKeyId;
/**
* The content of the signature, an opaque bytestring. The payload that this
* signature verifies MUST be unambiguously provided with the Signature during
* verification. A wrapper message might provide the payload explicitly.
* Alternatively, a message might have a canonical serialization that can
* always be unambiguously computed to derive the payload.
*
* @var string
*/
public $signature;
/**
* The identifier for the public key that verifies this signature. * The
* `public_key_id` is required. * The `public_key_id` SHOULD be an RFC3986
* conformant URI. * When possible, the `public_key_id` SHOULD be an immutable
* reference, such as a cryptographic digest. Examples of valid
* `public_key_id`s: OpenPGP V4 public key fingerprint: *
* "openpgp4fpr:74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See
* https://www.iana.org/assignments/uri-schemes/prov/openpgp4fpr for more
* details on this scheme. RFC6920 digest-named SubjectPublicKeyInfo (digest
* of the DER serialization): *
* "ni:sha-256;cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU" * "nih:sha-
* 256;703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
*
* @param string $publicKeyId
*/
public function setPublicKeyId($publicKeyId)
{
$this->publicKeyId = $publicKeyId;
}
/**
* @return string
*/
public function getPublicKeyId()
{
return $this->publicKeyId;
}
/**
* The content of the signature, an opaque bytestring. The payload that this
* signature verifies MUST be unambiguously provided with the Signature during
* verification. A wrapper message might provide the payload explicitly.
* Alternatively, a message might have a canonical serialization that can
* always be unambiguously computed to derive the payload.
*
* @param string $signature
*/
public function setSignature($signature)
{
$this->signature = $signature;
}
/**
* @return string
*/
public function getSignature()
{
return $this->signature;
}
}
// Adding a class alias for backwards compatibility with the previous class name.
class_alias(Signature::class, 'Google_Service_BinaryAuthorization_Signature');